Amazon Aurora is a drop-in replacement for MySQL that combines the performance and availability of traditional enterprise databases with the simplicity and cost-effectiveness of open source databases. Amazon Aurora is fully managed by Amazon Relational Database Service (RDS), which automates time-consuming administration tasks like hardware provisioning, database setup, patching, and backups.
You can ingest data from your Amazon Aurora MySQL database using Hevo Pipelines and replicate it to a Destination of your choice.
Prerequisites
Perform the following steps to configure your Amazon Aurora MySQL Source:
Set up MySQL Binary Logs for Replication
A binary log is a collection of log files that records information about data modifications and data object modifications made on a MySQL server instance. Typically binary logs are used for data replication and data recovery.
Hevo supports data ingestion for replication from MySQL servers via binary logs (BinLog). For this, binary logging must be enabled on your MySQL instance.
To enable binary logging for an Aurora DB cluster, follow these steps:
-
Open the Amazon RDS console.
-
In the left navigation pane, click Databases (or Instances if you are using an older version).
-
In the Databases section on the right, click the DB instance that you want to connect.
-
Click the Configuration tab, and then click the link text under DB cluster parameter group.
Note: If you are using the default Aurora DB cluster parameter group, then create a new DB cluster parameter group with Type as DB cluster parameter group.
-
Click Edit.
-
Update the values of the parameters as follows:
Parameter Name |
Value |
binlog_format |
ROW |
binlog_row_image |
full |
gtid-mode |
ON |
enforce_gtid_consistency |
ON |
Note:
-
Enabling GTID is recommended because it makes replication simpler and helps ensure that the primary and replica servers are in sync with each other.
-
Ensure that the value of binlog_row_value_options
parameter is not set to PARTIAL_JSON.
-
Click Save Changes.
-
Reboot the database instance that you are using to connect to Hevo, to apply the above changes.
To do this:
-
In the left navigation pane, under Dashboard, click Databases.
-
In the Databases section on the right, select the DB identifier of the Aurora MySQL instance you are replicating.
-
In the Actions drop-down, click Reboot.
Note: If you reboot a database instance with the Writer instance role in the DB cluster, all the remaining reader instances of that database in the cluster are rebooted as well.
-
On the Reboot DB Instance page, click Confirm to reboot your DB instance.
This confirms that binary logging is now enabled for your Aurora MySQL instance.
The replication reference guide on MySQL’s documentation portal provides a complete reference of the options available for replication and binary logging.
-
Log in to your Amazon Aurora MySQL database instance with ADMIN
privileges.
-
Run the following command to view the current BinLog retention period (in hours):
call mysql.rds_show_configuration;
-
If the BinLog retention period is less than 72 hours, run the following command to set it to at least 72 hours (three days).
call mysql.rds_set_configuration('binlog retention hours', 72);
Allowlist Hevo IP addresses for your region
You need to allowlist the Hevo IP address for your region to enable Hevo to connect to your Amazon Aurora MySQL database. To do this:
-
Open the Amazon RDS console.
-
In the left navigation pane, click Databases (or Instances if you’re using an older version)
-
In the Databases section on the right, click the DB identifier of the Amazon Aurora instance to configure a security group on.
-
In the Connectivity & security tab, click the link text under Security, VPC security groups.
-
On the Security Groups page, select the check box for your Security group ID, and from the Actions drop-down, click Edit inbound rules.
-
On the Edit inbound rules page:
-
Click Add rule.
-
Add a new rule with Hevo’s IP address for your region to give access to the Amazon Aurora MySQL instance.
-
Click Save rules.
Create a Database User and Grant Privileges
1. Create a database user (Optional)
Perform the following steps to create a database user in your Amazon Aurora MySQL database:
-
Connect to your Amazon Aurora MySQL database as a root user with an SQL client tool, such as MySQL workbench.
-
Create a database user:
CREATE USER <username>@'%' IDENTIFIED BY '<password>';
Note: Replace the placeholder values in the command above with your own. For example, <username> with hevo.
2. Grant privileges to the user
The database user specified in the Hevo Pipeline must have the following global privileges:
-
SELECT
- Select data from tables in your database which you want to replicate.
-
RELOAD
- Access to clear or reload internal caches, flush tables, or acquire locks.
-
SHOW DATABASES
- View list of database names in the server.
-
REPLICATION CLIENT
- Access to the MySQL server BinLog for replication.
-
REPLICATION SLAVE
- Access replication status and log details.
Note: The SELECT
, RELOAD
, and SHOW DATABASES
privileges are only required during the historical load.
Perform the following steps to set up these privileges:
-
Connect to your Amazon Aurora MySQL database as a root user with an SQL client tool, such as MySQL workbench.
-
Grant the required privileges to the user:
GRANT SELECT, RELOAD, SHOW DATABASES, REPLICATION CLIENT, REPLICATION SLAVE ON *.* TO <username>@'%';
-
Allow Hevo to access your database:
GRANT SELECT ON <database_name>.* TO <username>;
-
Grant privileges to the database user to read BinLog settings:
GRANT EXECUTE ON PROCEDURE mysql.rds_show_configuration TO '<username>'@'<hostname>';
-
Finalize the user’s permissions:
Note: Replace the placeholder values in the commands above with your own. For example, <username> with hevo.
Retrieve the Database Hostname and Port Number (Optional)
Note: The Amazon Aurora MySQL hostnames start with your database name and end with rds.amazonaws.com.
For example:
Host: mysql-rds-replica-1.xxxxxxxxx.rds.amazonaws.com
Port: 3306
-
In the left navigation pane of the Amazon RDS console, click Databases (or Instances if you are using an older version).
-
In the Databases section on the right, click the DB identifier of the Amazon Aurora MySQL instance.
-
Click the Connectivity & security tab, and copy the values under Endpoint and Port as the hostname and port number. You will specify these while creating your Hevo Pipeline.
Perform the following steps to configure your Amazon Aurora MySQL Source:
-
Click PIPELINES in the Navigation Bar.
-
Click + CREATE PIPELINE in the Pipelines List View.
-
On the Select Source Type page, under All Sources, click Edge, and then select Amazon Aurora MySQL.
-
In the Amazon Aurora MySQL screen, specify the following:
-
Source Name: A unique name for your Source, not exceeding 255 characters. For example, Amazon Aurora MySQL Source.
-
In the Connect to your MySQL section:
-
Database Host: The MySQL host’s IP address or DNS. This is the endpoint that you obtained in Step 4 above.
Note: For URL-based hostnames, exclude the http:// or https:// part. For example, if the hostname URL is http://mysql-replica.westeros.inc, enter mysql-replica.westeros.inc.
-
Database Port: The port on which your Amazon Aurora MySQL server listens for connections. This is the port number that you obtained in Step 4 above. Default value: 3306.
-
Database User: The authenticated user who has the permissions to read tables in your database. This user can be the one you created in Step 3 above or an existing user. For example, hevouser.
-
Database Password: The password of your database user.
-
Database Names: The comma separated list of databases from where you want to replicate data. For example, demo1, demo2.
-
(Optional) In the Additional Settings section:
-
Use SSH: Enable this option to connect to Hevo using an SSH tunnel instead of directly connecting your MySQL database host to Hevo. This provides an additional level of security to your database by not exposing your MySQL setup to the public.
If this option is turned off, you must configure your Source to accept connections from Hevo’s IP addresses.
-
Use SSL: Enable this option to use an SSL-encrypted connection. Specify the following:
-
CA File: The file containing the SSL server certificate authority (CA).
-
Client Certificate: The client’s public key certificate file.
-
Client Key: The client’s private key file.
-
Click TEST & CONTINUE to test the connection to your Amazon Aurora MySQL Source. Once the test is successful, you can proceed to set up your Destination.
Read the detailed Hevo documentation for the following related topics:
Data Type Mapping
Hevo maps the MySQL Source data type internally to a unified data type, referred to as the Hevo Data Type, in the table below. This data type is used to represent the Source data from all supported data types in a lossless manner.
The following table lists the supported MySQL data types and the corresponding Hevo data type to which they are mapped:
MySQL Data Type |
Hevo Data Type |
- BIT(1) - BOOLEAN - TINYINT(1) - TINYINT UNSIGNED(1) |
BOOLEAN |
- TINYINT(>1) - SMALLINT - TINYINT UNSIGNED(>1) |
SHORT |
- INT - MEDIUMINT - SMALLINT UNSIGNED - MEDIUMINT UNSIGNED - YEAR |
INTEGER |
- BIGINT - INT UNSIGNED - BIGINT UNSIGNED |
LONG |
- FLOAT(0-23) |
FLOAT |
- REAL - DOUBLE - FLOAT(24-53) |
DOUBLE |
- NUMERIC - DECIMAL |
DECIMAL |
- CHAR - VARCHAR - TINYTEXT - TEXT - MEDIUMTEXT - LONGTEXT - JSON - ENUM - SET |
VARCHAR |
- TIMESTAMP |
TIME_TZ |
- DATE |
DATE |
- TIME |
TIME |
- DATETIME |
TIMESTAMP |
- BIT(>1) - BINARY - VARBINARY - TINYBLOB - BLOB - MEDIUMBLOB - LONGBLOB |
BYTEARRAY |
At this time, the following MySQL data types are not supported by Hevo:
Note: If any of the Source objects contain data types that are not supported by Hevo, they are marked as unsupported during object configuration in the Pipeline.
Source Considerations
- MySQL does not generate log entries for cascading deletes. So, Hevo cannot capture these deletes for log-based Pipelines.
Limitations
-
Hevo only fetches tables from the MySQL database. It does not fetch other entities such as functions, stored procedures, views, and triggers.
-
Hevo does not set the metadata column __hevo__marked_deleted to True for data deleted from the Source table using the TRUNCATE command. This action could result in a data mismatch between the Source and Destination tables.